DocumentCode :
2095087
Title :
A Three - Party Authenticated Key Exchange Scheme Smartcard using Elliptic Curve Cryptosystem for Secure Key Exchange in Wireless Sensor Network
Author :
Yang, Jongwon ; Seo, Changho ; Cho, Jinman
Author_Institution :
Kongju Nat. Univ., Kongju
fYear :
2007
fDate :
20-23 June 2007
Firstpage :
1
Lastpage :
6
Abstract :
It was subjected of the concern of the researchers in which the security issue of the sensor network is many while the wireless sensor network rose as the ubiquitous computing core technology. Accordingly, many security protocols were proposed. And generally these are classified as the protocol of the symmetric key base and protocol of the public key infrastructure. Because of demanding the computation load in which the public key cryptography is excessive, security protocols using the symmetrical key code like SPIN are not appropriate in the sensor network. And an expandability is decreased as the size of a network is enlarged. Therefore, presently, many research that it relates to apply the security protocol putting a foundation in the public key to the sensor network is progressing. Presently, it was proposed in the protocols of the public key infrastructure like TinyPK and ECC2.0. The key exchange authenticated with three-party authenticated key exchange protocol, two-party authenticated key exchange protocol the verifier moreover induced from a password is proposed. But it is generated in the notable performance degradation and the problems that is weak in the man-in-the-middle attack. Moreover, the EKE(encrypted key exchange) technique of the password base is attacked with the password guessing attack, the secret key guess attack of a server, and the message retransmission the password file of a server is attacked. In this paper, the safe communications service was provided to users registered in the identical server. The authenticated key exchange of the password base which uses the smart card in order not to store a password in a server was proposed. And the clustering concept was applied to ECDH(elliptic curve Differ-Hellman) key agreement protocol for the shared key setting up between the efficient and safe node. And ECDSA(elliptic curve digital signature algorithm) is used in order to use the short stature in comparison with existing digital signature alg- orithms more and provide the efficient broadcast authentication.
Keywords :
protocols; public key cryptography; wireless sensor networks; ECC2.0; ECDH; ECDSA; EKE; TinyPK; broadcast authentication; computing core technology; elliptic curve Differ-Hellman; elliptic curve cryptosystem; elliptic curve digital signature algorithm; encrypted key exchange; public key cryptography; safe communications service; secure key exchange; security protocols; smartcard; three-party authenticated key exchange scheme; wireless sensor network; Computer networks; Cryptographic protocols; Digital signatures; Elliptic curve cryptography; File servers; Pervasive computing; Public key; Public key cryptography; Ubiquitous computing; Wireless sensor networks; Personal Information;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Electronics, 2007. ISCE 2007. IEEE International Symposium on
Conference_Location :
Irving, TX
Print_ISBN :
978-1-4244-1109-2
Electronic_ISBN :
978-1-4244-1110-8
Type :
conf
DOI :
10.1109/ISCE.2007.4382176
Filename :
4382176
Link To Document :
بازگشت